Biblioteca de recursos

Contáctenos

El nivel de adopción de la nube y su seguridad

La seguridad y el cumplimiento con las normativas son más relevantes que nunca. Vea cómo profesionales de seguridad de TI de todo el mundo han planificado la protección de sus nubes.

Buscar en la biblioteca

Aprenda a sacar el máximo partido a los productos McAfee que ya tiene o descubra las soluciones que responden a las necesidades actuales de su empresa. Utilice los siguientes filtros para restringir su búsqueda.

Filters

Reset FiltersClear
Resumen de la solución

Build a Coordinated and Unified Defense

The joint solution from McAfee and Phantom reduces complexity and improves operational efficiency through integrated, adaptive, and orchestrated intelligence and response. It helps security teams work smarter by automating repetitive tasks.

Resumen de la solución

Enhanced Network Traffic Analysis for McAfee Enterprise Security Manager

The integration of SS8 with McAfee Enterprise Security Manager enables you to quickly discover sophisticated long-tail attacks and investigate breach behavior with pinpoint accuracy, down to specific devices of interest.

Resumen de la solución

Infoblox and McAfee for Unified Security

The integrated solution from Infoblox and McAfee provides visibility into DNS and web traffic, plugs the DNS security gap in organizations, and automates data sharing between Infoblox DNS, DHCP, IPAM, (DDI) and McAfee product suites.

Resumen de la solución

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

Cisco and McAfee have interconnected their platforms and ecosystems for comprehensive visibility, threat context sharing, and real-time security orchestration based on policies. DXL threat intelligence fabric now interoperates with pxGrid, Cisco’s open security information grid, to share contextual information and execute threat mitigation actions among any application connected to either fabric.

Libro blanco

Integrating SIEM into Your Threat Hunting Strategy

The smart use of an intelligent SIEM is the key to managing the strategic, tactical and operational aspects of threat hunting. In today's threatscape we cannot ignore any of the three. Effective integration of SIEM as the hub and an arsenal of threat investigation tools as the spokes is critical to gaining enhanced visibility of the hazards coming down the road.

Ficha técnica

McAfee Embedded Control for Aerospace and Defense

For a technical summary on the McAfee product listed above, please view the product data sheet.

Ficha técnica

McAfee Embedded Control for Consumer and Home Networking

For a technical summary on the McAfee product listed above, please view the product data sheet.

Ficha técnica

McAfee Embedded Control for Healthcare

For a technical summary on the McAfee product listed above, please view the product data sheet.

Ficha técnica

McAfee Embedded Control for Retail

For a technical summary on the McAfee product listed above, please view the product data sheet.

Ficha técnica

McAfee Embedded Reputation SDK

For a technical summary on the McAfee product listed above, please view the product data sheet.

Resumen de la solución

Protect the Endpoint’s Vulnerability to Uncatalogued Malware

McAfee and ACS bring you two cybersecurity solutions to stop zero-day keyloggers from capturing credentials to advance an attack and a multifactor, out-of-band authentication solution that prevents data theft by man-in-the middle attacks.

Ficha técnica

McAfee Cloud Enablement Services for McAfee ePO

By using industry best practices and proven methodologies, the McAfee cloud enablement services for McAfee ePO helps expedite your transition to the cloud and enjoy peace of mind, knowing that your deployment maximizes your security effectiveness and efficiency.

Ficha técnica

McAfee Investigator

McAfee Investigator places advanced automation and analytics within reach of every SOC. Expert systems and endpoint capture tools integrate with existing data sources and security management systems for rapid time to value and minimal effort.

Ficha técnica

McAfee Premier Success Plan

The McAfee Premier Success Program comprehensive roadmap that combines professional and solutions services, training, and technical support with personalized management to help you more effectively plan your strategy and maintain your solutions, manage your operational risk, and see a sustained value over time.

Folleto

Brochure: McAfee Product Security Practices

Learn about McAfee's agile security development lifecycle (SDL).

Resumen de la solución

SIA Solution Brief: Interset

User and entity behavior analytics from Interset consumes the contextual data and rich security events collected in real time by McAfee Enterprise Security Manager.

Resumen de la solución

Gaining Advanced Analytic Insights into Your Network Solution Brief

Leveraging the power of SAS Cybersecurity with the integrative capabilities of DXL from McAfee, organizations gain a new security perspective on the devices connecting to their networks and stay one step ahead of emerging threats.

Ficha técnica

McAfee Advanced Threat Defense Appliance Specifications

This spec sheet provides technical specifications for two McAfee Advanced Threat Defense appliances: ATD-3100 and ATD-6100.

Ficha técnica

McAfee Data Loss Prevention (DLP) 6600 Specifications Sheet

This data sheet contains detailed specifications for McAfee Data Loss Prevention (DLP) 6600.

Libro blanco

Protecting the Private Cloud with Integrated and Automated Security

Enterprises have evolved their data centers to include private clouds, and are now challenged to secure these environments. Breaches in these highly virtualized environments are difficult to detect and can go unnoticed far too long. Advanced analysis capabilities are needed to effectively improve detection of sophisticated advanced attacks within a private cloud. This technical whitepaper explains how.

View McAfee Forums

Access our support community powered by McAfee users.

Forums

Visit McAfee Blog

Get insights from McAfee executives and security experts about the latest threats and new ways to approach security.

Blogs
Back to top